Summer D 2014 Schedule

Date
Chapter
Coverage
Readings
Assignment
Due Date
05/12/2014
Introduction
Readings
Read the Threat Environment articles and be prepared to discuss in class.


05/14/2014
Readings
COSO, COBIT, ERM
Using COSO to Assess IT Controls (Journal of Accountancy, May 2014)
From the Frameworks & Standards page, read:


05/19/2014
Chapter 1
The Threat Environment



05/21/2014
Chapter 2
Planning & Policy
We will be discussing an alternative Risk Assessment method OCTAV Alegro, you can read more here.


05/26/2014

No Class



05/28/2014
Module A
Networking Concepts



06/02/2014
Chapter 3
Cryptography
Read the Cryptography Readings from the Class Readings page


06/04/2014
Chapter 4
Secure Networks



06/05/2014
to
06/08/2014
Exam 1 (Chapter 1-4, Module A, Readings)




06/09/2014
Chapter 5
Access Controls



06/11/2014
Readings
Passwords
Read the required readings from the Password section of the Class Readings
Access Control Simulation Report
06/16/2014
06/16/2014
Chapter 6
Firewalls



06/18/2014
Chapter 7
Host Hardening



06/23/2014
Chapter 8
Application Security
Read the required Application Hardening articles section of the Class Readings


06/25/2014
Chapter 9 & 10
Data Protection & Incident and Disaster Response
Cybersecurity's Maginot Line: A real-world assessment of the defense-in-depth model by Mandiant, May 2014



06/30/2014
Readings
SOX IT Readings
This article discusses the Board's role in cybersecurity from a governance perspective: (Clarke and Olcott, 2014)Read the required readings from the IT Control and SOX section of the Class Readings
Security in the News
07/02/2014
07/02/2014
Readings
SEC Readings and Misc.
  1. Cyberattack's abound yet companies tell SEC losses are few By Chris Strohm, Eric Engleman and Dave Michaels - Apr 3, 2013)
  2. Companies Hacked by Chinese Didn’t Disclose Attacks to Investors By By Chris Strohm, Dave Michaels and Sonja Elmquist - May 21, 2014)
  3. CF Disclosure Guidance: Topic No. 2 S.E.C. (This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cybersecurity risks and cyber incidents)
  4. SEC Cybersecurity Roundtable Archive Webcast
  5. SEC OCIE Cybersecurity Initiative (April 15, 2014)
  6. AICPA Top 5 Cybercrimes (2013)
  7. ERM for cloud computing (COSO)


07/07/2014 to 07/11/2014
Exam 2 (Chapter 5-10, Readings)